Matching Items (1,435)
Filtering by

Clear all filters

133343-Thumbnail Image.png
Description
This paper will be exploring a marketing plan for a Kpop Fan artist, Jennifer Lee. Kpop is a genre of music originating from South Korea that provides a whole-package entertainment. Fan artists are producers who create produce for the consumption and purchase of other Kpop fans. The paper will consider

This paper will be exploring a marketing plan for a Kpop Fan artist, Jennifer Lee. Kpop is a genre of music originating from South Korea that provides a whole-package entertainment. Fan artists are producers who create produce for the consumption and purchase of other Kpop fans. The paper will consider segmentation and the products and platforms that best target them in order to maximize revenue. A survey was performed with a sample size of 314 participants to find out consumer behavior and preference as well as producer situation. Consumers come from both the United States and abroad. Customers come directly and almost exclusively from followers. Therefore, increasing the number of followers on Instagram is essential to increasing revenue. Jennifer has time, resource, and ability constraints, while the market has limited potential. The conclusion is that Jennifer should become more organized as a business. To grow her following, she should cater more towards the most popular fandoms (BTS), make art tutorials, consider collaborations, and better inform followers of her products/services available for purchase. The social media platforms key to marketing Jennifer's products are Instagram and Twitter. Other platforms to be used to increase exposure are Tumblr, Amino Apps, DeviantArt, Reddit, and YouTube. She must also declutter all of these virtual storefronts of unnecessary content to varying degrees in order to build ease of access and a trustworthy brand image. The best platforms for transaction is a personal store, RedBubble (a website that allows users to sell a variety of products with their uploaded images printed onto them), Patreon, and in-person at conventions.
ContributorsXu, Everest Christine (Author) / Eaton, Kathryn (Thesis director) / Ingram-Waters, Mary (Committee member) / Department of Marketing (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133346-Thumbnail Image.png
Description
The advertising agency, in its variety of forms, is one of the most powerful forces in the modern world. Its products are seen globally through various multimedia outlets and they strongly impact culture and economy. Since its conception in 1843 by Volney Palmer, the advertising agency has evolved into the

The advertising agency, in its variety of forms, is one of the most powerful forces in the modern world. Its products are seen globally through various multimedia outlets and they strongly impact culture and economy. Since its conception in 1843 by Volney Palmer, the advertising agency has evolved into the recognizable—and unrecognizable—firms scattered around the world today. In the United States alone, there are roughly 13.4 thousand agencies, many of which also have branches in other countries. The evolution of the modern advertising agency coincided with, and even preceded, some of the major inflection points in history. Understanding how and why changes in advertising agencies affected these inflection points provides a glimpse of understanding into the relationship between advertising, business, and societal values.

In the pages ahead we will explore the future of the advertising industry. We will analyze our research to uncover the underlying trends pointing towards what is to come and work to apply those explanations to our understanding of advertising in the future.
ContributorsHarris, Chase (Co-author) / Potthoff, Zachary (Co-author) / Gray, Nancy (Thesis director) / Samper, Adriana (Committee member) / Department of Information Systems (Contributor) / Department of Marketing (Contributor) / Herberger Institute for Design and the Arts (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133350-Thumbnail Image.png
Description
The goal of our project was to determine how to create the most marketable hockey team. To do this, consumer needs, team psychology, and financing were all researched and evaluated. With this information, a business plan was designed around the next NHL expansion team. Two surveys, one for marketing distributed

The goal of our project was to determine how to create the most marketable hockey team. To do this, consumer needs, team psychology, and financing were all researched and evaluated. With this information, a business plan was designed around the next NHL expansion team. Two surveys, one for marketing distributed to the general public, and one for team psychology distributed to current and former hockey players were created and sent out, while data for the financing aspect was collected by comparing data from other NHL teams and franchises from different sports. In terms of financials, this comes in lower than average ticket prices, a nice and expensive stadium, the ideal city to generate capital, and sufficient money spent on advertising. Our ticket prices of $140 is based on having a low enough price to generate lots of demand while high enough to make a profit. The $600 million stadium (which will be fully funded) will surely draw a significant crowd. Choosing Seattle as a city is the most ideal to meet these goals and lastly, in meeting with an NHL GM, we determined $4 million in yearly advertising costs as sufficient in creating the most marketable team. Throughout this whole process, we remained data focus. We focused on data from a customized marketing survey, organizational structures, salary cap, and attendance. What our marketing survey results showed us is that our potential fans wanted three characteristics in a hockey team: speed, intensity, and scoring. In looking at organizational structures teams that exemplified these characteristics had a heavy emphasis on development and scouting. So we built our organizational tree around those two ideals. We hired GM Mike Futa, a current director of player personnel for the L.A. Kings, and Head Coach Adam Oates, a current skills development coach for top players to bring those ideals to fruition. In constructing our team we replicated the rules set forth for the Vegas Knights' expansion draft and hypothesized a likely protected list based off of last years lists. As a result we were able to construct a team that statistically out performed the Vegas Knights draft numbers by double, in goals, assists, and points, while also beating them in PIM. Based off of these numbers and an analysis of how goals translate into game attendance we are confident that we have constructed a team that has the highest potential for marketability. For the team psychology area, when creating a roster and scouting players, some of our main findings were that it is important to pursue players who get along well with their teammates and coaching staff, are aggressive, are leaders on the team, and are vocal players who communicate effectively. We also recommended avoiding players who significantly portrayed any "pet-peeve" traits, with the most emphasis placed on "disrespectful toward teammates," and the least emphasis placed on "over-aggression." By following all of these recommendations, we believe the most marketable hockey team possible can be created.
ContributorsQuinn, Colin Christopher (Co-author) / Spigel, Carlos (Co-author) / Meyer, Matt (Co-author) / Eaton, John (Thesis director) / McIntosh, Daniel (Committee member) / Department of Marketing (Contributor) / Sandra Day O'Connor College of Law (Contributor) / Department of Management and Entrepreneurship (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133359-Thumbnail Image.png
Description
The current trend of interconnected devices, or the internet of things (IOT) has led to the popularization of single board computers (SBC). This is primarily due to their form-factor and low price. This has led to unique networks of devices that can have unstable network connections and minimal processing power.

The current trend of interconnected devices, or the internet of things (IOT) has led to the popularization of single board computers (SBC). This is primarily due to their form-factor and low price. This has led to unique networks of devices that can have unstable network connections and minimal processing power. Many parallel program- ming libraries are intended for use in high performance computing (HPC) clusters. Unlike the IOT environment described, HPC clusters will in general look to obtain very consistent network speeds and topologies. There are a significant number of software choices that make up what is referred to as the HPC stack or parallel processing stack. My thesis focused on building an HPC stack that would run on the SCB computer name the Raspberry Pi. The intention in making this Raspberry Pi cluster is to research performance of MPI implementations in an IOT environment, which had an impact on the design choices of the cluster. This thesis is a compilation of my research efforts in creating this cluster as well as an evaluation of the software that was chosen to create the parallel processing stack.
ContributorsO'Meara, Braedon Richard (Author) / Meuth, Ryan (Thesis director) / Dasgupta, Partha (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133381-Thumbnail Image.png
Description
This thesis discusses three recent optimization problems that seek to reduce disease spread on arbitrary graphs by deleting edges, and it discusses three approximation algorithms developed for these problems. Important definitions are presented including the Linear Threshold and Triggering Set models and the set function properties of submodularity and monotonicity.

This thesis discusses three recent optimization problems that seek to reduce disease spread on arbitrary graphs by deleting edges, and it discusses three approximation algorithms developed for these problems. Important definitions are presented including the Linear Threshold and Triggering Set models and the set function properties of submodularity and monotonicity. Also, important results regarding the Linear Threshold model and computation of the influence function are presented along with proof sketches. The three main problems are formally presented, and NP-hardness results along with proof sketches are presented where applicable. The first problem seeks to reduce spread of infection over the Linear Threshold process by making use of an efficient tree data structure. The second problem seeks to reduce the spread of infection over the Linear Threshold process while preserving the PageRank distribution of the input graph. The third problem seeks to minimize the spectral radius of the input graph. The algorithms designed for these problems are described in writing and with pseudocode, and their approximation bounds are stated along with time complexities. Discussion of these algorithms considers how these algorithms could see real-world use. Challenges and the ways in which these algorithms do or do not overcome them are noted. Two related works, one which presents an edge-deletion disease spread reduction problem over a deterministic threshold process and the other which considers a graph modification problem aimed at minimizing worst-case disease spread, are compared with the three main works to provide interesting perspectives. Furthermore, a new problem is proposed that could avoid some issues faced by the three main problems described, and directions for future work are suggested.
ContributorsStanton, Andrew Warren (Author) / Richa, Andrea (Thesis director) / Czygrinow, Andrzej (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
131495-Thumbnail Image.png
Description
Criminal Justice is a complex subject matter, and not everyone agrees on the way a criminal justice system ought to function. But one feature that is common to virtually all forms of proposed justice systems is that a true justice system treats people ethically. The question, then, is how a

Criminal Justice is a complex subject matter, and not everyone agrees on the way a criminal justice system ought to function. But one feature that is common to virtually all forms of proposed justice systems is that a true justice system treats people ethically. The question, then, is how a justice system can achieve this. This investigation analyzed two ethical theories, Kantianism and Utilitarianism, to determine which one would be better suited for guiding a criminal justice system on how to treat the people involved ethically. This investigation focused on applying the two theories to the U.S. Criminal Justice System in particular.
Kantianism is a duty-based moral theory in which actions have an intrinsic moral worth. This means certain actions are morally right and other are morally wrong, regardless of the intended or realized consequences. The theory relies on the categorical imperative to judge the morality of certain actions. It states that an action is moral if its maxim can be willed universal law and if it avoids treating people as merely a means. In contrast, Utilitarianism is a consequentialist theory which focuses on the consequences of an action in judging moral worth. In Utilitarianism, the morally correct action is the one which will maximize utility; that is to say, the morally right action is the one which will produce the greatest amount of happiness and minimize the amount of pain for the greatest number of people.
After applying these two theories to moral dilemmas facing the U.S. Criminal Justice System, including the appropriate collection of DNA evidence, the use of police deception, and the use of criminal punishments such as solitary confinement or the death penalty, it was clear that Kantianism was the ethical theory best suited for guiding the system in treating people ethically. This is because Kantianism’s focus on the intrinsic moral worth of an action rather than its consequences leaves less room for ambiguity than does Utilitarianism.
ContributorsMorett, Xavier Laakea (Author) / Manninen, Bertha (Thesis director) / Kimberly, Kobojek (Committee member) / School of Criminology and Criminal Justice (Contributor) / School of Mathematical and Natural Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131504-Thumbnail Image.png
Description
In the last few years, billion-dollar companies like Yahoo and Equifax have had data breaches causing millions of people’s personal information to be leaked online. Other billion-dollar companies like Google and Facebook have gotten in trouble for abusing people’s personal information for financial gain as well. In this new age

In the last few years, billion-dollar companies like Yahoo and Equifax have had data breaches causing millions of people’s personal information to be leaked online. Other billion-dollar companies like Google and Facebook have gotten in trouble for abusing people’s personal information for financial gain as well. In this new age of technology where everything is being digitalized and stored online, people all over the world are concerned about what is happening to their personal information and how they can trust it is being kept safe. This paper describes, first, the importance of protecting user data, second, one easy tool that companies and developers can use to help ensure that their user’s information (credit card information specifically) is kept safe, how to implement that tool, and finally, future work and research that needs to be done. The solution I propose is a software tool that will keep credit card data secured. It is only a small step towards achieving a completely secure data anonymized system, but when implemented correctly, it can reduce the risk of credit card data from being exposed to the public. The software tool is a script that can scan every viable file in any given system, server, or other file-structured Linux system and detect if there any visible credit card numbers that should be hidden.
ContributorsPappas, Alexander (Author) / Zhao, Ming (Thesis director) / Kuznetsov, Eugene (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131514-Thumbnail Image.png
Description
Political polarization is the coalescence of political parties -- and the individuals of which parties are composed -- around opposing ends of the ideological spectrum. Political parties in the United States have always been divided, however, in recent years this division has only intensified. Recently, polarization has also wound its

Political polarization is the coalescence of political parties -- and the individuals of which parties are composed -- around opposing ends of the ideological spectrum. Political parties in the United States have always been divided, however, in recent years this division has only intensified. Recently, polarization has also wound its way to the Supreme Court and the nomination processes of justices to the Court. This paper examines how prevalent polarization in the Supreme Court nomination process has become by looking specifically at the failed nomination of Judge Merrick Garland and the confirmations of now-Justices Neil Gorsuch and Brett Kavanaugh. This is accomplished by comparing the ideologies and qualifications of the three most recent nominees to those of previous nominees, as well as analysing the ideological composition of the Senate at the times of the individual nominations.
ContributorsJoss, Jacob (Author) / Hoekstra, Valerie (Thesis director) / Critchlow, Donald (Committee member) / Computer Science and Engineering Program (Contributor) / School of Politics and Global Studies (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131520-Thumbnail Image.png
Description
A lab protocol was created in order to introduce arson evidence analysis to students. The procedures dictate a thorough introduction from evidence handling procedures to analysis of common accelerant mass spectrum. The objectives of the lab protocol included classifying and describing various pieces of arson evidence and common accelerants as

A lab protocol was created in order to introduce arson evidence analysis to students. The procedures dictate a thorough introduction from evidence handling procedures to analysis of common accelerant mass spectrum. The objectives of the lab protocol included classifying and describing various pieces of arson evidence and common accelerants as well as synthesizing information about accelerant composition to interpret GC-MS data output. This would allow the student to experience first-hand what the subsection of arson analysis has to offer in the field of forensic science which could help the student decide on more specialties to study later on. I was unable to run the lab protocol in a laboratory setting, therefore in the future I want to use the lab protocol and receive feedback in order to improve the protocol so the student is receiving the best possible learning outcomes. The experience of creating a lab protocol in forensic science gave myself a greater understanding of what goes on behind an academic learning procedure and more insight on arson evidence analysis.
Created2020-05
131525-Thumbnail Image.png
Description
The original version of Helix, the one I pitched when first deciding to make a video game
for my thesis, is an action-platformer, with the intent of metroidvania-style progression
and an interconnected world map.

The current version of Helix is a turn based role-playing game, with the intent of roguelike
gameplay and a dark

The original version of Helix, the one I pitched when first deciding to make a video game
for my thesis, is an action-platformer, with the intent of metroidvania-style progression
and an interconnected world map.

The current version of Helix is a turn based role-playing game, with the intent of roguelike
gameplay and a dark fantasy theme. We will first be exploring the challenges that came
with programming my own game - not quite from scratch, but also without a prebuilt
engine - then transition into game design and how Helix has evolved from its original form
to what we see today.
ContributorsDiscipulo, Isaiah K (Author) / Meuth, Ryan (Thesis director) / Kobayashi, Yoshihiro (Committee member) / School of Mathematical and Statistical Sciences (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05