Matching Items (619)
153547-Thumbnail Image.png
Description
Mobile applications (Apps) markets with App stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. Several distinctive features of mobile App store markets including – (a) highly heterogeneous consumer preferences and values, (b) high consumer cognitive burden

Mobile applications (Apps) markets with App stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. Several distinctive features of mobile App store markets including – (a) highly heterogeneous consumer preferences and values, (b) high consumer cognitive burden of searching a large selection of similar Apps, and (c) continuously updateable product features and price – present a unique opportunity for IS researchers to investigate theoretically motivated research questions in this area. The aim of this dissertation research is to investigate the key determinants of mobile Apps success in App store markets. The dissertation is organized into three distinct and related studies. First, using the key tenets of product portfolio management theory and theory of economies of scope, this study empirically investigates how sellers’ App portfolio strategies are associated with sales performance over time. Second, the sale performance impacts of App product cues, generated from App product descriptions and offered from market formats, are examined using the theories of market signaling and cue utilization. Third, the role of App updates in stimulating consumer demands in the presence of strong ranking effects is appraised. The findings of this dissertation work highlight the impacts of sellers’ App assortment, strategic product description formulation, and long-term App management with price/feature updates on success in App market. The dissertation studies make key contributions to the IS literature by highlighting three key managerially and theoretically important findings related to mobile Apps: (1) diversification across selling categories is a key driver of high survival probability in the top charts, (2) product cues strategically presented in the descriptions have complementary relationships with market cues in influencing App sales, and (3) continuous quality improvements have long-term effects on App success in the presence of strong ranking effects.
ContributorsLee, Gun Woong (Author) / Santanam, Raghu (Thesis advisor) / Gu, Bin (Committee member) / Park, Sungho (Committee member) / Arizona State University (Publisher)
Created2015
153032-Thumbnail Image.png
Description
Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.
ContributorsZhao, Ziming (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2014
153404-Thumbnail Image.png
Description
Splicing of digital images is a powerful form of tampering which transports regions of an image to create a composite image. When used as an artistic tool, this practice is harmless but when these composite images can be used to create political associations or are submitted as evidence in the

Splicing of digital images is a powerful form of tampering which transports regions of an image to create a composite image. When used as an artistic tool, this practice is harmless but when these composite images can be used to create political associations or are submitted as evidence in the judicial system they become more impactful. In these cases, distinction between an authentic image and a tampered image can become important.

Many proposed approaches to image splicing detection follow the model of extracting features from an authentic and tampered dataset and then classifying them using machine learning with the goal of optimizing classification accuracy. This thesis approaches splicing detection from a slightly different perspective by choosing a modern splicing detection framework and examining a variety of preprocessing techniques along with their effect on classification accuracy. Preprocessing techniques explored include Joint Picture Experts Group (JPEG) file type block line blurring, image level blurring, and image level sharpening. Attention is also paid to preprocessing images adaptively based on the amount of higher frequency content they contain.

This thesis also recognizes an identified problem with using a popular tampering evaluation dataset where a mismatch in the number of JPEG processing iterations between the authentic and tampered set creates an unfair statistical bias, leading to higher detection rates. Many modern approaches do not acknowledge this issue but this thesis applies a quality factor equalization technique to reduce this bias. Additionally, this thesis artificially inserts a mismatch in JPEG processing iterations by varying amounts to determine its effect on detection rates.
ContributorsGubrud, Aaron (Author) / Li, Baoxin (Thesis advisor) / Candan, Kasim (Committee member) / Kadi, Zafer (Committee member) / Arizona State University (Publisher)
Created2015
150189-Thumbnail Image.png
Description
This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log

This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log archives over a period of five years) and focused on drawing more precise metrics from different perspectives of the communication data. Also, I attempted to overcome the scalability issue by using Apache Pig libraries, which run on a MapReduce framework based Hadoop Cluster. I described four metrics based on which I observed and analyzed the data and also presented the results which show the required patterns and anomalies to better understand and infer the communication. Also described the usage experience with Pig Latin (scripting language of Apache Pig Libraries) for this research and how they brought the feature of scalability, simplicity, and visibility in this data intensive research work. These approaches are useful in project monitoring, to augment human observation and reporting, in social network analysis, to track individual contributions.
ContributorsMotamarri, Lakshminarayana (Author) / Santanam, Raghu (Thesis advisor) / Ye, Jieping (Thesis advisor) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2011
151108-Thumbnail Image.png
Description
Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing

Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing to not only leverage advanced technologies and services at lower costs, but also to maintain their competitive edge and grow. Furthermore, as prior studies have shown, there are systematic differences among industries in terms of the degree and impact of IT outsourcing. This dissertation uses a three-study approach to investigate issues related to IT outsourcing at the macro and micro levels, and provides different perspectives for understanding the issues associated with IT outsourcing at a firm and industry level. The first study evaluates the diffusion patterns of IT outsourcing across industries at aggregate level and within industries at a firm level. In addition, it analyzes the factors that influence the diffusion of IT outsourcing and tests models that help us understand the rate and patterns of diffusion at the industry level. This study establishes the presence of hierarchical contagion effects in the diffusion of IT outsourcing. The second study explores the role of location and proximity of industries to understand the diffusion patterns of IT outsourcing within clusters using the spatial analysis technique of space-time clustering. It establishes the presence of simultaneous space and time interactions at the global level in the diffusion of IT outsourcing. The third study examines the development of specialized hubs for IT outsourcing services in four developing economies: Brazil, Russia, India, and China (BRIC). In this study, I adopt a theory-building approach involving the identification of explanatory anomalies, and propose a new hybrid theory called- knowledge network theory. The proposed theory suggests that the growth and development of the IT and related services sector is a result of close interactions among adaptive institutions. It is also based on new knowledge that is created, and which flows through a country's national diaspora of expatriate entrepreneurs, technologists and business leaders. In addition, relevant economic history and regional geography factors are important. This view diverges from the traditional view, wherein effective institutions are considered to be the key determinants of long-term economic growth.
ContributorsMann, Arti (Author) / Kauffman, Robert J. (Thesis advisor) / Santanam, Raghu (Thesis advisor) / St. Louis, Robert (Committee member) / Anselin, Luc (Committee member) / Nault, Barrie R (Committee member) / Arizona State University (Publisher)
Created2012
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
133343-Thumbnail Image.png
Description
This paper will be exploring a marketing plan for a Kpop Fan artist, Jennifer Lee. Kpop is a genre of music originating from South Korea that provides a whole-package entertainment. Fan artists are producers who create produce for the consumption and purchase of other Kpop fans. The paper will consider

This paper will be exploring a marketing plan for a Kpop Fan artist, Jennifer Lee. Kpop is a genre of music originating from South Korea that provides a whole-package entertainment. Fan artists are producers who create produce for the consumption and purchase of other Kpop fans. The paper will consider segmentation and the products and platforms that best target them in order to maximize revenue. A survey was performed with a sample size of 314 participants to find out consumer behavior and preference as well as producer situation. Consumers come from both the United States and abroad. Customers come directly and almost exclusively from followers. Therefore, increasing the number of followers on Instagram is essential to increasing revenue. Jennifer has time, resource, and ability constraints, while the market has limited potential. The conclusion is that Jennifer should become more organized as a business. To grow her following, she should cater more towards the most popular fandoms (BTS), make art tutorials, consider collaborations, and better inform followers of her products/services available for purchase. The social media platforms key to marketing Jennifer's products are Instagram and Twitter. Other platforms to be used to increase exposure are Tumblr, Amino Apps, DeviantArt, Reddit, and YouTube. She must also declutter all of these virtual storefronts of unnecessary content to varying degrees in order to build ease of access and a trustworthy brand image. The best platforms for transaction is a personal store, RedBubble (a website that allows users to sell a variety of products with their uploaded images printed onto them), Patreon, and in-person at conventions.
ContributorsXu, Everest Christine (Author) / Eaton, Kathryn (Thesis director) / Ingram-Waters, Mary (Committee member) / Department of Marketing (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133346-Thumbnail Image.png
Description
The advertising agency, in its variety of forms, is one of the most powerful forces in the modern world. Its products are seen globally through various multimedia outlets and they strongly impact culture and economy. Since its conception in 1843 by Volney Palmer, the advertising agency has evolved into the

The advertising agency, in its variety of forms, is one of the most powerful forces in the modern world. Its products are seen globally through various multimedia outlets and they strongly impact culture and economy. Since its conception in 1843 by Volney Palmer, the advertising agency has evolved into the recognizable—and unrecognizable—firms scattered around the world today. In the United States alone, there are roughly 13.4 thousand agencies, many of which also have branches in other countries. The evolution of the modern advertising agency coincided with, and even preceded, some of the major inflection points in history. Understanding how and why changes in advertising agencies affected these inflection points provides a glimpse of understanding into the relationship between advertising, business, and societal values.

In the pages ahead we will explore the future of the advertising industry. We will analyze our research to uncover the underlying trends pointing towards what is to come and work to apply those explanations to our understanding of advertising in the future.
ContributorsHarris, Chase (Co-author) / Potthoff, Zachary (Co-author) / Gray, Nancy (Thesis director) / Samper, Adriana (Committee member) / Department of Information Systems (Contributor) / Department of Marketing (Contributor) / Herberger Institute for Design and the Arts (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133350-Thumbnail Image.png
Description
The goal of our project was to determine how to create the most marketable hockey team. To do this, consumer needs, team psychology, and financing were all researched and evaluated. With this information, a business plan was designed around the next NHL expansion team. Two surveys, one for marketing distributed

The goal of our project was to determine how to create the most marketable hockey team. To do this, consumer needs, team psychology, and financing were all researched and evaluated. With this information, a business plan was designed around the next NHL expansion team. Two surveys, one for marketing distributed to the general public, and one for team psychology distributed to current and former hockey players were created and sent out, while data for the financing aspect was collected by comparing data from other NHL teams and franchises from different sports. In terms of financials, this comes in lower than average ticket prices, a nice and expensive stadium, the ideal city to generate capital, and sufficient money spent on advertising. Our ticket prices of $140 is based on having a low enough price to generate lots of demand while high enough to make a profit. The $600 million stadium (which will be fully funded) will surely draw a significant crowd. Choosing Seattle as a city is the most ideal to meet these goals and lastly, in meeting with an NHL GM, we determined $4 million in yearly advertising costs as sufficient in creating the most marketable team. Throughout this whole process, we remained data focus. We focused on data from a customized marketing survey, organizational structures, salary cap, and attendance. What our marketing survey results showed us is that our potential fans wanted three characteristics in a hockey team: speed, intensity, and scoring. In looking at organizational structures teams that exemplified these characteristics had a heavy emphasis on development and scouting. So we built our organizational tree around those two ideals. We hired GM Mike Futa, a current director of player personnel for the L.A. Kings, and Head Coach Adam Oates, a current skills development coach for top players to bring those ideals to fruition. In constructing our team we replicated the rules set forth for the Vegas Knights' expansion draft and hypothesized a likely protected list based off of last years lists. As a result we were able to construct a team that statistically out performed the Vegas Knights draft numbers by double, in goals, assists, and points, while also beating them in PIM. Based off of these numbers and an analysis of how goals translate into game attendance we are confident that we have constructed a team that has the highest potential for marketability. For the team psychology area, when creating a roster and scouting players, some of our main findings were that it is important to pursue players who get along well with their teammates and coaching staff, are aggressive, are leaders on the team, and are vocal players who communicate effectively. We also recommended avoiding players who significantly portrayed any "pet-peeve" traits, with the most emphasis placed on "disrespectful toward teammates," and the least emphasis placed on "over-aggression." By following all of these recommendations, we believe the most marketable hockey team possible can be created.
ContributorsQuinn, Colin Christopher (Co-author) / Spigel, Carlos (Co-author) / Meyer, Matt (Co-author) / Eaton, John (Thesis director) / McIntosh, Daniel (Committee member) / Department of Marketing (Contributor) / Sandra Day O'Connor College of Law (Contributor) / Department of Management and Entrepreneurship (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133881-Thumbnail Image.png
Description
In recent years, companies have been expanding their business efforts on a global scale. This project explores this expansion of American-based multinational corporations (MNCs) in Ireland, and the comparison of how their culture motivation in the workplace. We did a cultural study using Hofstede and Trompenaars' cultural dimensions of the

In recent years, companies have been expanding their business efforts on a global scale. This project explores this expansion of American-based multinational corporations (MNCs) in Ireland, and the comparison of how their culture motivation in the workplace. We did a cultural study using Hofstede and Trompenaars' cultural dimensions of the two countries then used McClelland's Needs Theory, Equity Theory, and Herzberg's Motivation-Hygiene Theory in order to create three research questions. (1) How does the manager define success for the firm as a whole and for their employees, (2) How is the definition of success reflected in the company's corporate culture (i.e. values, norms and practices), along with how cultural values, norms and practices affect the company, and (3) How do external forces (i.e. governmental factors, workplace technology, etc.) affect the workplace environment and motivation for employees? With these we hypothesized that for research question 1, we hypothesized that from our study of Hofstede's and Trompenaars' cultural frameworks, Irish employees will show a greater tendency to favor affiliation, nAff, as opposed to a need for achievement, nAch, in American employees, according to McClelland's Needs Theory. For research question 2, we predicted that motivation would be administered through style of feedback to employees and office norms, such as autonomy, flexible hours, and work-life balance. For research question 3, we hypothesized that Ireland would have an impact from external factors such as government and technology, whereas the U.S. employees would face no clear impact. We conducted eight, qualitative interviews using a questionnaire, either in person or via video conference. The interviewees were all managers in some facet and have all had some international experience. Through the analysis of the interviews, we found that the Irish employees focused on how employees are able to help or contribute to a group (nAff), instead of looking at how the contribution of a group can be used to meet individual goals (nAch). The American companies reflected Trompenaars' definition of individualism in which employees focus on collaborating in teams, as long as individual goals are met, and benchmarked collaboration as a performance measure, tying in the need for achievement, for research question one. For the second research question, we found that employees in Ireland had a focus on teamwork in the workplace and much higher respect for work-life balance. American firms, in contrast, had a greater focus on making sure employees were contributing, meeting their goals, and getting their work done. While American firms did acknowledge work-life balance and its importance, there was a priority for coming in early and/or staying late to make sure a job got done. Findings for our third question showed that government factors did impact Ireland more, due to labor laws such as required vacation days in Ireland, and that technology had less of an impact than expected, for both countries. More importantly was our finding that the companies in Ireland were greatly impacted by the decisions made by the business executives in the United States.
ContributorsSong, Jenny Jungwon (Co-author) / Brown, William (Co-author) / Arrfelt, Mathias (Thesis director) / Moore, James (Committee member) / Department of Marketing (Contributor) / Department of Management and Entrepreneurship (Contributor) / W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05