Matching Items (583)
153547-Thumbnail Image.png
Description
Mobile applications (Apps) markets with App stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. Several distinctive features of mobile App store markets including – (a) highly heterogeneous consumer preferences and values, (b) high consumer cognitive burden

Mobile applications (Apps) markets with App stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. Several distinctive features of mobile App store markets including – (a) highly heterogeneous consumer preferences and values, (b) high consumer cognitive burden of searching a large selection of similar Apps, and (c) continuously updateable product features and price – present a unique opportunity for IS researchers to investigate theoretically motivated research questions in this area. The aim of this dissertation research is to investigate the key determinants of mobile Apps success in App store markets. The dissertation is organized into three distinct and related studies. First, using the key tenets of product portfolio management theory and theory of economies of scope, this study empirically investigates how sellers’ App portfolio strategies are associated with sales performance over time. Second, the sale performance impacts of App product cues, generated from App product descriptions and offered from market formats, are examined using the theories of market signaling and cue utilization. Third, the role of App updates in stimulating consumer demands in the presence of strong ranking effects is appraised. The findings of this dissertation work highlight the impacts of sellers’ App assortment, strategic product description formulation, and long-term App management with price/feature updates on success in App market. The dissertation studies make key contributions to the IS literature by highlighting three key managerially and theoretically important findings related to mobile Apps: (1) diversification across selling categories is a key driver of high survival probability in the top charts, (2) product cues strategically presented in the descriptions have complementary relationships with market cues in influencing App sales, and (3) continuous quality improvements have long-term effects on App success in the presence of strong ranking effects.
ContributorsLee, Gun Woong (Author) / Santanam, Raghu (Thesis advisor) / Gu, Bin (Committee member) / Park, Sungho (Committee member) / Arizona State University (Publisher)
Created2015
153032-Thumbnail Image.png
Description
Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.
ContributorsZhao, Ziming (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2014
150189-Thumbnail Image.png
Description
This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log

This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log archives over a period of five years) and focused on drawing more precise metrics from different perspectives of the communication data. Also, I attempted to overcome the scalability issue by using Apache Pig libraries, which run on a MapReduce framework based Hadoop Cluster. I described four metrics based on which I observed and analyzed the data and also presented the results which show the required patterns and anomalies to better understand and infer the communication. Also described the usage experience with Pig Latin (scripting language of Apache Pig Libraries) for this research and how they brought the feature of scalability, simplicity, and visibility in this data intensive research work. These approaches are useful in project monitoring, to augment human observation and reporting, in social network analysis, to track individual contributions.
ContributorsMotamarri, Lakshminarayana (Author) / Santanam, Raghu (Thesis advisor) / Ye, Jieping (Thesis advisor) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2011
151108-Thumbnail Image.png
Description
Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing

Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing to not only leverage advanced technologies and services at lower costs, but also to maintain their competitive edge and grow. Furthermore, as prior studies have shown, there are systematic differences among industries in terms of the degree and impact of IT outsourcing. This dissertation uses a three-study approach to investigate issues related to IT outsourcing at the macro and micro levels, and provides different perspectives for understanding the issues associated with IT outsourcing at a firm and industry level. The first study evaluates the diffusion patterns of IT outsourcing across industries at aggregate level and within industries at a firm level. In addition, it analyzes the factors that influence the diffusion of IT outsourcing and tests models that help us understand the rate and patterns of diffusion at the industry level. This study establishes the presence of hierarchical contagion effects in the diffusion of IT outsourcing. The second study explores the role of location and proximity of industries to understand the diffusion patterns of IT outsourcing within clusters using the spatial analysis technique of space-time clustering. It establishes the presence of simultaneous space and time interactions at the global level in the diffusion of IT outsourcing. The third study examines the development of specialized hubs for IT outsourcing services in four developing economies: Brazil, Russia, India, and China (BRIC). In this study, I adopt a theory-building approach involving the identification of explanatory anomalies, and propose a new hybrid theory called- knowledge network theory. The proposed theory suggests that the growth and development of the IT and related services sector is a result of close interactions among adaptive institutions. It is also based on new knowledge that is created, and which flows through a country's national diaspora of expatriate entrepreneurs, technologists and business leaders. In addition, relevant economic history and regional geography factors are important. This view diverges from the traditional view, wherein effective institutions are considered to be the key determinants of long-term economic growth.
ContributorsMann, Arti (Author) / Kauffman, Robert J. (Thesis advisor) / Santanam, Raghu (Thesis advisor) / St. Louis, Robert (Committee member) / Anselin, Luc (Committee member) / Nault, Barrie R (Committee member) / Arizona State University (Publisher)
Created2012
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
133340-Thumbnail Image.png
Description
For as long as humans have been working, they have been looking for ways to get that work done better, faster, and more efficient. Over the course of human history, mankind has created innumerable spectacular inventions, all with the goal of making the economy and daily life more efficient. Today,

For as long as humans have been working, they have been looking for ways to get that work done better, faster, and more efficient. Over the course of human history, mankind has created innumerable spectacular inventions, all with the goal of making the economy and daily life more efficient. Today, innovations and technological advancements are happening at a pace like never seen before, and technology like automation and artificial intelligence are poised to once again fundamentally alter the way people live and work in society. Whether society is prepared or not, robots are coming to replace human labor, and they are coming fast. In many areas artificial intelligence has disrupted entire industries of the economy. As people continue to make advancements in artificial intelligence, more industries will be disturbed, more jobs will be lost, and entirely new industries and professions will be created in their wake. The future of the economy and society will be determined by how humans adapt to the rapid innovations that are taking place every single day. In this paper I will examine the extent to which automation will take the place of human labor in the future, project the potential effect of automation to future unemployment, and what individuals and society will need to do to adapt to keep pace with rapidly advancing technology. I will also look at the history of automation in the economy. For centuries humans have been advancing technology to make their everyday work more productive and efficient, and for centuries this has forced humans to adapt to the modern technology through things like training and education. The thesis will additionally examine the ways in which the U.S. education system will have to adapt to meet the demands of the advancing economy, and how job retraining programs must be modernized to prepare workers for the changing economy.
ContributorsCunningham, Reed P. (Author) / DeSerpa, Allan (Thesis director) / Haglin, Brett (Committee member) / School of International Letters and Cultures (Contributor) / Department of Finance (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133361-Thumbnail Image.png
Description
Nuclear weapons possess enormous potential to inflict damage on our world. The majority of countries in the world denounce the proliferation of these weapons, but a minority of countries have a desire to proliferate. This essay analyzes the impact of regime type and alliance strength to a nuclear state on

Nuclear weapons possess enormous potential to inflict damage on our world. The majority of countries in the world denounce the proliferation of these weapons, but a minority of countries have a desire to proliferate. This essay analyzes the impact of regime type and alliance strength to a nuclear state on protégé proliferation decisions. Prior research focuses on single factors in proliferation decisions and fails to take in to account the multi-faceted factors that influence the international system that states operate in. The analysis finds that regime type gives an indication about a state’s likelihood to proliferate, but does not explain proliferation choices comprehensively. Alliance strength plays a large role in a state’s security calculations and must be analyzed in conjunction to regime type to understand proliferation decisions.
ContributorsHsu, Kai Nalu (Author) / Wright, Thorin (Thesis director) / Thies, Cameron (Committee member) / W.P. Carey School of Business (Contributor) / Department of Finance (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133372-Thumbnail Image.png
Description
#VanLife is a long-time, up and coming lifestyle movement on social media centered around the process of leaving the traditional nine-to-five work week for a life on the road in a camper van. While the ‘hippie-esque’ vagabond lifestyle has its humble roots long before the turn of the century,

#VanLife is a long-time, up and coming lifestyle movement on social media centered around the process of leaving the traditional nine-to-five work week for a life on the road in a camper van. While the ‘hippie-esque’ vagabond lifestyle has its humble roots long before the turn of the century, the inception of social media platforms such as Instagram and Pinterest have fueled the more recent popularization of a full-time life on the road. #VanLifers often freelance on the road, work part time jobs, or gain sponsorships to help fund their traveling and humble lifestyle.
As the #VanLife craze continues to grow, new businesses are finding ways to meet the demand in the market. For #Vanlifers who own and operate their own camper vans, specialized companies like GoWesty, Vanagain, and Boxeer offer a full range of parts, upgrades, and custom mechanical and systems conversion kits to keep these vans on the road as OE manufacturers discontinue production on these parts. For those who have an itch to try out the #VanLife for a shorter period and without the financial commitment, companies like Roamerica, TontoTrails, and adventureRIGS offer nightly and weekly rental opportunities on fully-outfitted campervans ready to hit the road.
For my Honors Project I wrote a complete analysis on the history, development, and modernization of the #VanLife movement. With plans to take to the road for an extended period of time after graduation, I also developed a complete financial plan for a one-year #VanLife experience. The financial plan includes a comprehensive set of budgets that scrutinize the start-up an operational costs of the #VanLife and associated travel.
ContributorsRischitelli, Noah Gary (Author) / Garverick, Michael (Thesis director) / Dawson, Gregory (Committee member) / WPC Graduate Programs (Contributor) / School of Accountancy (Contributor) / Department of Finance (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
131509-Thumbnail Image.png
Description
This thesis project was conducted to create a practical tool to help micro and small local food enterprises identify potential strategies and sources of finance. Currently, many of these enterprises are unable to obtain the financial capital needed to start-up or maintain operations.

Sources and strategies of finance studied and

This thesis project was conducted to create a practical tool to help micro and small local food enterprises identify potential strategies and sources of finance. Currently, many of these enterprises are unable to obtain the financial capital needed to start-up or maintain operations.

Sources and strategies of finance studied and ultimately included in the tool were Loans, Equity, Membership, Crowdfunding, and Grants. The tool designed was a matrix that takes into account various criteria of the business (e.g. business lifecycle, organizational structure, business performance) and generates a financial plan based on these criteria and how they align with the selected business strategies. After strategies are found, stakeholders can search through an institutional database created in conjunction with the matrix tool to find possible institutional providers of financing that relate to the strategy or strategies found.

The tool has shown promise in identifying sources of finance for micro and small local food enterprises in practical use with hypothetical business cases, however further practical use is necessary to provide further input and revise the tool as needed. Ultimately, the tool will likely become fully user-friendly and stakeholders will not need the assistance of another expert helping them to use it. Finally, despite the promise of the tool itself, the fundamental and underlying problem that many of these businesses face (lack of infrastructure and knowledge) still exists, and while this tool can also help capacity-building efforts towards both those seeking and those providing finance, an institutional attitude adjustment towards social and alternative enterprises is necessary in order to further simplify the process of obtaining finance.
ContributorsDwyer, Robert Francis (Author) / Wiek, Arnim (Thesis director) / Forrest, Nigel (Committee member) / Department of Finance (Contributor) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
133886-Thumbnail Image.png
Description
This paper will focus on the changes in China's OFDI while also explaining its growth. However, another primary focus will be comparing the relationships between China, Hong Kong, and Africa. This paper will show the correlating changes between the three regions and explain the distribution of China's investments. One argument

This paper will focus on the changes in China's OFDI while also explaining its growth. However, another primary focus will be comparing the relationships between China, Hong Kong, and Africa. This paper will show the correlating changes between the three regions and explain the distribution of China's investments. One argument is that Hong Kong may play a large role in facilitating Chinese investment into Africa, which if not disaggregated, could lead to inaccurate numbers of China's FDI into Africa. The purpose of this paper is to investigate the importance of China's relationship with Hong Kong and Africa. In 2012, Garth Shelton argued that Hong Kong was an important gateway in South Africa's trade with China. Since then, many others have made similar claims in support of Hong Kong's bigger role. However, due to the difficulty of finding specific data for each region, these analyses are incomplete and fail to clearly substantiate their theory. I will try to find a correlation by gathering my own data, tables, and through different interviews.
ContributorsSon, James (Author) / Simonson, Mark (Thesis director) / Iheduru, Okechukwu (Committee member) / Economics Program in CLAS (Contributor) / Department of Finance (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05