Matching Items (39)
151950-Thumbnail Image.png
Description
Social media offers a powerful platform for the independent digital content producer community to develop, disperse, and maintain their brands. In terms of information systems research, the broad majority of the work has not examined hedonic consumption on Social Media Sites (SMS). The focus has mostly been on the organizational

Social media offers a powerful platform for the independent digital content producer community to develop, disperse, and maintain their brands. In terms of information systems research, the broad majority of the work has not examined hedonic consumption on Social Media Sites (SMS). The focus has mostly been on the organizational perspectives and utilitarian gains from these services. Unlike through traditional commerce channels, including e-commerce retailers, consumption enhancing hedonic utility is experienced differently in the context of a social media site; consequently, the dynamic of the decision-making process shifts when it is made in a social context. Previous research assumed a limited influence of a small, immediate group of peers. But the rules change when the network of peers expands exponentially. The assertion is that, while there are individual differences in the level of susceptibility to influence coming from others, these are not the most important pieces of the analysis--unlike research centered completely on influence. Rather, the context of the consumption can play an important role in the way social influence factors affect consumer behavior on Social Media Sites. Over the course of three studies, this dissertation will examine factors that influence consumer decision-making and the brand personalities created and interpreted in these SMS. Study one examines the role of different types of peer influence on consumer decision-making on Facebook. Study two observes the impact of different types of producer message posts with the different types of influence on decision-making on Twitter. Study three will conclude this work with an exploratory empirical investigation of actual twitter postings of a set of musicians. These studies contribute to the body of IS literature by evaluating the specific behavioral changes related to consumption in the context of digital social media: (a) the power of social influencers in contrast to personal preferences on SMS, (b) the effect on consumers of producer message types and content on SMS at both the profile level and the individual message level.
ContributorsSopha, Matthew (Author) / Santanam, Raghu T (Thesis advisor) / Goul, Kenneth M (Committee member) / Gu, Bin (Committee member) / Arizona State University (Publisher)
Created2013
135671-Thumbnail Image.png
Description
Financial statements are one of the most important, if not the most important, documents for investors. These statements are prepared quarterly and yearly by the company accounting department, and are then audited in detail by a large external accounting firm. Investors use these documents to determine the value of the

Financial statements are one of the most important, if not the most important, documents for investors. These statements are prepared quarterly and yearly by the company accounting department, and are then audited in detail by a large external accounting firm. Investors use these documents to determine the value of the company, and trust that the company was truthful in its statements, and the auditing firm correctly audited the company's financial statements for any mistakes in their books and balances. Mistakes on a company's financial statements can be costly. However, financial fraud on the statements can be outright disastrous. Penalties for accounting fraud can include individual lifetime prison sentences, as well as company fines for billions of dollars. As students in the accounting major, it is our responsibility to ensure that financial statements are accurate and truthful to protect ourselves, other stakeholders, and the companies we work for. This ethics game takes the stories of Enron, WorldCom, and Lehman Brothers and uses them to help students identify financial fraud and how it can be prevented, as well as the consequences behind unethical decisions in financial reporting. The Enron scandal involved CEO Kenneth Lay and his predecessor Jeffery Skilling hiding losses in their financial statements with the help of their auditing firm, Arthur Andersen. Enron collapsed in 2002, and Lay was sentenced to 45 years in prison with his conspirator Skilling sentenced to 24 years in prison. In the WorldCom scandal, CEO Bernard "Bernie" Ebbers booked line costs as capital expenses (overstating WorldCom's assets), and created fraudulent accounts to inflate revenue and WorldCom's profit. Ebbers was sentenced to 25 years in prison and lost his title as WorldCom's Chief Executive Officer. Lehman Brothers took advantage of a loophole in accounting procedure Repo 105, that let the firm hide $50 billion in profits. No one at Lehman Brothers was sentenced to jail since the transaction was technically considered legal, but Lehman was the largest investment bank to fail and the only large financial institution that was not bailed out by the U.S. government.
ContributorsPanikkar, Manoj Madhuraj (Author) / Samuelson, Melissa (Thesis director) / Ahmad, Altaf (Committee member) / Department of Information Systems (Contributor) / School of Accountancy (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
133388-Thumbnail Image.png
Description
For students on a college campus, many courses can present challenges to them academically. Some universities have taken an initiative to respond to this by offering tutoring opportunities at a central location. Generally this provides help for some struggling students, but others are left with many questions unanswered. Two primary

For students on a college campus, many courses can present challenges to them academically. Some universities have taken an initiative to respond to this by offering tutoring opportunities at a central location. Generally this provides help for some struggling students, but others are left with many questions unanswered. Two primary reasons for this are that some tutoring services are broad in scope and that there may not be sufficient one-on-one time with a tutor. With the development of a mobile application, a solution is possible to improve upon the tutoring experience for all students. The concept revolves around the formation of a labor market of freelancers, known as a gig economy, to create a large supply of tutors who can provide their services to a student looking for help in a specific course. A strategic process was followed to develop this mobile application, called Tuzee. To begin, an early concept and design was drafted to shape a clear vision statement and effective user experience. Planning and research followed, where technical requirements including an efficient database and integrated development environment were selected. After these prerequisites, the development stage of the application started and a working app produced. Subsequently, a business model was devised along with possible features to be added upon a successful launch. With a peer-to-peer approach powering the app, monitoring user engagement lies as a core principle for consistent growth. The vision statement will frequently be referred to: enhance university academics by enabling the interaction of students with each other.
ContributorsArcaro, Daniel James (Author) / Ahmad, Altaf (Thesis director) / Sopha, Matthew (Committee member) / Department of Information Systems (Contributor) / WPC Graduate Programs (Contributor) / Department of Management and Entrepreneurship (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133172-Thumbnail Image.png
Description
This thesis explores cybersecurity as a profession and whether it belongs in academia. It also explores exactly how it should be implemented into universities. Whether in a bachelor's program or master's program, cybersecurity degree or cybersecurity concentration, engineering school or business school, cybersecurity has a place in higher education that

This thesis explores cybersecurity as a profession and whether it belongs in academia. It also explores exactly how it should be implemented into universities. Whether in a bachelor's program or master's program, cybersecurity degree or cybersecurity concentration, engineering school or business school, cybersecurity has a place in higher education that plays an integral role in helping fix the issue of a lack of cybersecurity professionals. At Arizona State University, a cybersecurity concentration currently exists in the engineering school at both the bachelor's and master's level as well as the business school at the bachelor level. The one location it is missing from is the master's level of the business school. The goal of this report is to suggest a change to the specific curriculum in the Information Systems Department at the W.P. Carey School of Business. This thesis compares the curriculum of the Master of Science in Information Management (MSIM) program at Arizona State to eight other programs around the country that either offer a cybersecurity concentration option, offer cybersecurity degrees, or have highly ranked MSIM programs. A new curriculum is recommended that includes greater flexibility for students in customizing their education to specific career fields within information systems, offers multiple certificate options including cybersecurity, and better matches what the other highly ranked programs are offering to students. This curriculum is not only better for students attending or seeking Arizona State University but better for the University itself. It offers a more well-rounded scope of topics than the current program does while maintaining the identity and strengths of the current program.
ContributorsWelcome, Anthony (Author) / Sopha, Matthew (Thesis director) / Mazzola, Daniel (Committee member) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2018-12
132443-Thumbnail Image.png
Description
Data has quickly become a cornerstone of society. Across our daily lives, industry, policy, and more, we are experiencing what can only be called a “data revolution” igniting ferociously. While data is gaining more and more importance, consumers do not fully understand the extent of its use and subsequent capitalization

Data has quickly become a cornerstone of society. Across our daily lives, industry, policy, and more, we are experiencing what can only be called a “data revolution” igniting ferociously. While data is gaining more and more importance, consumers do not fully understand the extent of its use and subsequent capitalization by companies. This paper explores the current climate relating to data security and data privacy. It aims to start a conversation regarding the culture around the sharing and collection of data. We explore aspects of data privacy in four tiers: the current cultural and social perception of data privacy, its relevance in our daily lives, its importance in society’s dialogue. Next, we look at current policy and legislature in place today, focusing primarily on Europe’s established GDPR and the incoming California Consumer Privacy Act, to see what measures are already in place and what measures need to be adopted to mold more of a culture of transparency. Next, we analyze current data privacy regulations and power of regulators like the FTC and SEC to see what tools they have at their disposal to ensure accountability in the tech industry when it comes to how our data is used. Lastly, we look at the potential act of treating and viewing data as an asset, and the implications of doing so in the scope of possible valuation and depreciation techniques. The goal of this paper is to outline initial steps to better understand and regulate data privacy and collection practices. Our goal is to bring this issue to the forefront of conversation in society, so that we may start the first step in the metaphorical marathon of data privacy, with the goal of establishing better data privacy controls and become a more data-conscious society.
ContributorsAnderson, Thomas C (Co-author) / Shafeeva, Zarina (Co-author) / Swiech, Jakub (Co-author) / Marchant, Gary (Thesis director) / Sopha, Matthew (Committee member) / WPC Graduate Programs (Contributor) / Department of Finance (Contributor) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
137256-Thumbnail Image.png
Description
The Wish List is a website that allows users to input URLs of products that they like into a wish list, much like Amazon's Wish List. The website also connects users to their Facebook friends who also use the application, so that users can view their friends' wish lists and

The Wish List is a website that allows users to input URLs of products that they like into a wish list, much like Amazon's Wish List. The website also connects users to their Facebook friends who also use the application, so that users can view their friends' wish lists and "claim" products that they've purchased. This makes the Wish List like a registry as well. This report documents the functionality and the structure of the website, but the website itself is not yet released to the general public.
ContributorsChesley, Bryana Renee (Author) / Ahmad, Altaf (Thesis director) / Prince, Linda (Committee member) / Barrett, The Honors College (Contributor) / WPC Graduate Programs (Contributor) / Department of Information Systems (Contributor) / School of Accountancy (Contributor)
Created2014-05
137294-Thumbnail Image.png
Description
In the modern world of business, access to information can mean the difference between thousands of dollars. Executives at any corporation, large or small, would probably agree that they need to know everything and anything at the drop of a hat. As software has become more prominent in the business

In the modern world of business, access to information can mean the difference between thousands of dollars. Executives at any corporation, large or small, would probably agree that they need to know everything and anything at the drop of a hat. As software has become more prominent in the business world so has the demand for an ever faster representation of business data. While traditional desktop applications have been used for decades to record, store, and display data, they do have their limitations. One such limitation being location—that is, they reside on a desktop. Remote access services have alleviated some of the pain that comes from location but there is still a need for faster access to data. Thankfully, the internet offers itself as ideal platform for fast, reliable, data retrieval. An ERP (Enterprise Resource Planning) application manages several departments of a business. Most sophisticated applications handle accounting, marketing, ordering, invoicing, etc. plus other business operations processes. One such ERP is Evosus, a system designed for the pool industry. While Evosus is an effective ERP system, it does suffer from the same limits that any traditional desktop application has—namely fast remote access. Evosus is an application that stores all of its data in a Microsoft SQL Server Database. MSSQL Server is known for being flexible, secure, and easy to use. The use of MSSQL Server alone allows Evosus to be more flexible than many competitors. With a few simple programming commands, all of the data stored in the Evosus database can be effectively displayed in web format. Therefore, the limitations brought on by location no longer exist. Using the Microsoft product stack, a web application has been developed to display Evosus data on the web. ASP.NET MVC is used to help with the Separation of Concerns (SoC) that accompanies all web development. The website, called EvosusConnect, is used to demonstrate how, in a real world scenario, instant access to crucial business data can benefit a company, no matter how large or small.
ContributorsHoward, Carson J (Author) / Prince, Linda (Thesis director) / Ahmad, Altaf (Committee member) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2014-05
134714-Thumbnail Image.png
Description
Veelog is an Android application created to monitor and track data regarding maintenance for an individual's personal vehicles. For instance, most car owners change their oil every 10,000 miles or so. The application will help track this data, allowing users to identify their own range of how often a service

Veelog is an Android application created to monitor and track data regarding maintenance for an individual's personal vehicles. For instance, most car owners change their oil every 10,000 miles or so. The application will help track this data, allowing users to identify their own range of how often a service needs to be completed and provide helpful information when the need comes around. The goal of the application is to provide a platform for individuals to record, use, and save information relevant to themselves as the owner. By ensuring that there is space for the data to be recorded and properly tracked, car owners can take initiative in providing preventative maintenance for their vehicles. The idea for the application originally came from observing many individuals who keep a notebook in each of their vehicles for recording and keeping track of maintenance schedules manually. Veelog is a solution that keeps all maintenance manuals in one place, with the additional benefit of calculating upcoming services automatically. Veelog users can also make customizations to their profiles including custom services that are specific to their own needs. The target users for Veelog are individuals who want to be proactive in servicing their vehicles. The application requires frequent checking and regular updates to stay current and provide accurate information for upcoming services. Being proactive about vehicle maintenance provides long term benefits such as preventing serious car trouble, which ultimately results in saving money and staying safe and makes the application worth the extra attention. Ideally, individuals who have not previously been proactive about vehicle maintenance will also be encouraged by the convenience that Veelog provides.
ContributorsKnorr, Jeremy Joseph (Author) / Ahmad, Altaf (Thesis director) / Olsen, Christopher (Committee member) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
133459-Thumbnail Image.png
Description
The Internet has brought along countless benefits to society and for the case of this thesis, especially educational benefits. Students can now have endless resources to whatever they wish to learn. This is especially beneficial in a time where a clear majority of studies show that the U.S.'s financial literacy

The Internet has brought along countless benefits to society and for the case of this thesis, especially educational benefits. Students can now have endless resources to whatever they wish to learn. This is especially beneficial in a time where a clear majority of studies show that the U.S.'s financial literacy is in a concerning state. However, even though there may be a bounty of websites and programs available non-exclusively, they do not all effectively teach accounting and finance. In fact, many websites aimed at teaching accounting or finance simply replicate textbooks and glossaries, even though there are ways to make them more effective learning tools. Since the scope of this empirical observation is too large to confront, this thesis is mainly concerned with students currently learning accounting and finance who wish to have more supplemental learning information. Accordingly, the overarching argument of this thesis, is that college students aiming to learn accounting do not have enough resources to fully understand the classroom formulas and concepts. The creative solution for this problem is a website, name FIN-WIT aimed at providing financial content in plain language and with real-world examples.
ContributorsDitore, Heather Beatrice (Author) / Orpurt, Steven (Thesis director) / Sopha, Matthew (Committee member) / Department of Information Systems (Contributor) / School of Accountancy (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133159-Thumbnail Image.png
Description
Our lives are documented and facilitated by the internet. Given that an increasing proportion of time is being spent online, search and browsing history offers a unique frame of reference to conduct a qualitative study since it contains individual goals, day-to-day experiences, illicit thoughts, and questions, all while capturing sentiments

Our lives are documented and facilitated by the internet. Given that an increasing proportion of time is being spent online, search and browsing history offers a unique frame of reference to conduct a qualitative study since it contains individual goals, day-to-day experiences, illicit thoughts, and questions, all while capturing sentiments rather than statistics. Seeing this recorded daily activity mapped out over the course of several years would hopefully provide a startling reminder of how life can be accurately and simply described as a series of constantly evolving interests and intentions, as well as give a sense of how exhaustively massive internet companies collect private information online. The search engine giant Google offers its users the transparency and freedom to export and download an archive of their web activity through a service known as Google Takeout. We propose using this service to empower ordinary individuals with Google accounts by developing a comprehensive and qualitative approach to understanding and gaining insights about their personal behavior online. In this paper, we first define and analyze the need for such a product. Then we conduct a variety of intent and interest-sensitive computational analysis methods on a sample browser history to explore and contextualize emergent trends, as a proof of concept. Finally, we create a blueprint for building an interactive application which uses our approach to generate dynamic dashboards and unique user profiles from search and browsing data.
ContributorsLi, Jason (Author) / Sopha, Matthew (Thesis director) / Shutters, Shade (Committee member) / Department of Information Systems (Contributor, Contributor) / Dean, W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2018-12