Matching Items (25)
153547-Thumbnail Image.png
Description
Mobile applications (Apps) markets with App stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. Several distinctive features of mobile App store markets including – (a) highly heterogeneous consumer preferences and values, (b) high consumer cognitive burden

Mobile applications (Apps) markets with App stores have introduced a new approach to define and sell software applications with access to a large body of heterogeneous consumer population. Several distinctive features of mobile App store markets including – (a) highly heterogeneous consumer preferences and values, (b) high consumer cognitive burden of searching a large selection of similar Apps, and (c) continuously updateable product features and price – present a unique opportunity for IS researchers to investigate theoretically motivated research questions in this area. The aim of this dissertation research is to investigate the key determinants of mobile Apps success in App store markets. The dissertation is organized into three distinct and related studies. First, using the key tenets of product portfolio management theory and theory of economies of scope, this study empirically investigates how sellers’ App portfolio strategies are associated with sales performance over time. Second, the sale performance impacts of App product cues, generated from App product descriptions and offered from market formats, are examined using the theories of market signaling and cue utilization. Third, the role of App updates in stimulating consumer demands in the presence of strong ranking effects is appraised. The findings of this dissertation work highlight the impacts of sellers’ App assortment, strategic product description formulation, and long-term App management with price/feature updates on success in App market. The dissertation studies make key contributions to the IS literature by highlighting three key managerially and theoretically important findings related to mobile Apps: (1) diversification across selling categories is a key driver of high survival probability in the top charts, (2) product cues strategically presented in the descriptions have complementary relationships with market cues in influencing App sales, and (3) continuous quality improvements have long-term effects on App success in the presence of strong ranking effects.
ContributorsLee, Gun Woong (Author) / Santanam, Raghu (Thesis advisor) / Gu, Bin (Committee member) / Park, Sungho (Committee member) / Arizona State University (Publisher)
Created2015
153032-Thumbnail Image.png
Description
Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.
ContributorsZhao, Ziming (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2014
150189-Thumbnail Image.png
Description
This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log

This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log archives over a period of five years) and focused on drawing more precise metrics from different perspectives of the communication data. Also, I attempted to overcome the scalability issue by using Apache Pig libraries, which run on a MapReduce framework based Hadoop Cluster. I described four metrics based on which I observed and analyzed the data and also presented the results which show the required patterns and anomalies to better understand and infer the communication. Also described the usage experience with Pig Latin (scripting language of Apache Pig Libraries) for this research and how they brought the feature of scalability, simplicity, and visibility in this data intensive research work. These approaches are useful in project monitoring, to augment human observation and reporting, in social network analysis, to track individual contributions.
ContributorsMotamarri, Lakshminarayana (Author) / Santanam, Raghu (Thesis advisor) / Ye, Jieping (Thesis advisor) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2011
151108-Thumbnail Image.png
Description
Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing

Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing to not only leverage advanced technologies and services at lower costs, but also to maintain their competitive edge and grow. Furthermore, as prior studies have shown, there are systematic differences among industries in terms of the degree and impact of IT outsourcing. This dissertation uses a three-study approach to investigate issues related to IT outsourcing at the macro and micro levels, and provides different perspectives for understanding the issues associated with IT outsourcing at a firm and industry level. The first study evaluates the diffusion patterns of IT outsourcing across industries at aggregate level and within industries at a firm level. In addition, it analyzes the factors that influence the diffusion of IT outsourcing and tests models that help us understand the rate and patterns of diffusion at the industry level. This study establishes the presence of hierarchical contagion effects in the diffusion of IT outsourcing. The second study explores the role of location and proximity of industries to understand the diffusion patterns of IT outsourcing within clusters using the spatial analysis technique of space-time clustering. It establishes the presence of simultaneous space and time interactions at the global level in the diffusion of IT outsourcing. The third study examines the development of specialized hubs for IT outsourcing services in four developing economies: Brazil, Russia, India, and China (BRIC). In this study, I adopt a theory-building approach involving the identification of explanatory anomalies, and propose a new hybrid theory called- knowledge network theory. The proposed theory suggests that the growth and development of the IT and related services sector is a result of close interactions among adaptive institutions. It is also based on new knowledge that is created, and which flows through a country's national diaspora of expatriate entrepreneurs, technologists and business leaders. In addition, relevant economic history and regional geography factors are important. This view diverges from the traditional view, wherein effective institutions are considered to be the key determinants of long-term economic growth.
ContributorsMann, Arti (Author) / Kauffman, Robert J. (Thesis advisor) / Santanam, Raghu (Thesis advisor) / St. Louis, Robert (Committee member) / Anselin, Luc (Committee member) / Nault, Barrie R (Committee member) / Arizona State University (Publisher)
Created2012
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
135218-Thumbnail Image.png
Description
Research has found there is a lack of women present in the IS industry. In order to combat this problem, this research examines why women are not choosing IS majors at the university level. At Arizona State University, the Computer Information Systems undergraduate degree program is only 23 percent female.

Research has found there is a lack of women present in the IS industry. In order to combat this problem, this research examines why women are not choosing IS majors at the university level. At Arizona State University, the Computer Information Systems undergraduate degree program is only 23 percent female. Many different factors can influence the decision to choose a major, so survey methodology was used to ascertain what factors were the most important to different demographic groups when making this decision. The study found no significant gender difference when making this decision, but rather a difference between specific majors. Genuine interest, interesting work and high career earnings were identified as the most influential reasons for choosing a college major. The results were used to create recommendations for the IS Department at ASU to implement in the next year and encourage more female participation in the CIS undergraduate degree program.
ContributorsJorgenson, Erica Marie (Author) / Santanam, Raghu (Thesis director) / Moser, Kathleen (Committee member) / Department of Information Systems (Contributor) / W. P. Carey School of Business (Contributor) / Department of Supply Chain Management (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
136774-Thumbnail Image.png
Description
Considering the overwhelming prevalence of BPH, how can it best be managed in light of the aging population? The purpose of this investigation is to illustrate that BPH and LUTS are conditions that are highly conducive to health literacy technology interventions. This objective will be met by: a) Providing an

Considering the overwhelming prevalence of BPH, how can it best be managed in light of the aging population? The purpose of this investigation is to illustrate that BPH and LUTS are conditions that are highly conducive to health literacy technology interventions. This objective will be met by: a) Providing an overview of the clinically relevant information regarding BPH, including anatomy, physiology, epidemiology, symptoms, and medical treatment for the disease; b) Establishing the necessity for novel health care delivery solutions by identifying past successes and challenges associated with technologic advances in related fields; c) Providing evidence of a lack of a systematic approach to BPH education, especially as it relates to health literacy. The relative successes and failures of previously established clinical decision aids will be discussed, leading to recommendations on how to improve upon these standards. Finally, the procedures and results of a pilot study will be analyzed in an effort to further highlight the necessity of engaging patients in the clinical decision making process.
Created2014-12
136353-Thumbnail Image.png
Description
The Patient Protection and Affordable Care Act of 2010 was created as an overhaul of the US Healthcare system with a goal of getting all American citizens and legal residents healthcare that was both affordable and of good quality. Now almost a year removed from it going into effect, this

The Patient Protection and Affordable Care Act of 2010 was created as an overhaul of the US Healthcare system with a goal of getting all American citizens and legal residents healthcare that was both affordable and of good quality. Now almost a year removed from it going into effect, this study looks to determine how the ACA has worked in getting individuals who were previously uninsured and required charitable-based healthcare into health insurance programs within a small population in Arizona. This study evaluates the type of insurance program, the quality and ease of access of the care, and the general affordability of the healthcare. This study found that 75% of individuals surveyed had gained health insurance in the last year, with 95% expecting to be insured for 2015. The large majority rated the quality of their care and the accessibility of it as good, with corresponding increased use of primary care providers as a health resource. The affordability of the care was still a major issue for those who were found to be uninsured and for those who were insured. Despite affordability issues, self-reported measures of general health and access to care were reported by the majority of respondents to have improved over the last 12 months.
Created2015-05
136184-Thumbnail Image.png
Description
Currently, the medical industry employs an acute treatment process centered on responsiveness and restoration. This method fails those with chronic illness who require disease management and proactivity. As a solution, the medical industry has implemented programs focused on providing integrated, coordinated care. This project examines two primary models to accommodate

Currently, the medical industry employs an acute treatment process centered on responsiveness and restoration. This method fails those with chronic illness who require disease management and proactivity. As a solution, the medical industry has implemented programs focused on providing integrated, coordinated care. This project examines two primary models to accommodate chronically ill patients: Accountable Care Organizations (ACOs) and Patient Centered Medical Homes (PCMHs). Specifically, this paper examines the data from Pioneer and Medicare Shared Savings Program ACOs. In the aggregate, the data indicate that these programs have been unsuccessful due to several key issues: a lack of patient and physician engagement, failure to incentivize medical professionals and failed collaboration between both ACOs and PCMHs. Remedying these issues would improve the ability of both ACOs and PCMHs to provide integrated, comprehensive care to patients with chronic illnesses.
ContributorsWoods, Cassie Marie (Author) / Ketcham, Jonathan (Thesis director) / Samper, Adriana (Committee member) / Barrett, The Honors College (Contributor) / Department of Marketing (Contributor)
Created2015-05
136139-Thumbnail Image.png
Description
Objective: To assess and quantify the effect of state’s price transparency regulations (hereafter, PTR) on healthcare pricing.

Data Sources: I use the Healthcare Cost and Utilization Project’s Nationwide Inpatient Sample (NIS) from 2000 to 2011. The NIS is a 20% sample of all inpatient claims. The Manhattan

Objective: To assess and quantify the effect of state’s price transparency regulations (hereafter, PTR) on healthcare pricing.

Data Sources: I use the Healthcare Cost and Utilization Project’s Nationwide Inpatient Sample (NIS) from 2000 to 2011. The NIS is a 20% sample of all inpatient claims. The Manhattan Institute supplied data on the availability of health savings accounts in each state. State PTR implementation dates were gathered by Hans Christensen, Eric Floyd, and Mark Maffett of University of Chicago’s Booth School of Business by contacting the health department, hospital association, or website controller in each state.

Study Design: The NIS data was collapsed by procedure, hospital, and year providing averages for the dependent variable, Cost, and a host of covariates. Cost is a product of Total Charges within the NIS and the hospital’s Cost to Charge ratio. A new binary variable, PTR, was defined as ‘0’ if the year was strictly less than the disclosure website’s implementation date, ‘1’ for afterwards, and missing for the year of implementation. Then, using multivariate OLS regression with fixed effect modeling, the change in cost from before to after the year of implementation is estimated.

Principal Findings: The analysis estimates the effect of PTR to decrease the average cost per procedure by 7%. Specifications identify within state, within hospital, and within procedure variation, and reports that 78% of the cost decrease is due to within-hospital, within-procedure price discounts. An additional model includes the interaction of PTR with the prevalence of health savings accounts (hereafter, HSAs) and procedure electivity. The results show that PTR lowers costs by an additional 3 percent with each additional 10 percentage point increase in the availability of HSAs. In contrast, the cost reductions from PTR were much smaller for procedures more frequently coded as elective.

Conclusions: The study concludes price transparency regulations can lead to a decrease in a procedure’s costs on average, primarily through price discounts and slightly through lower cost procedures, but not due to patients moving to cheaper hospitals. This implies that hospitals are taking initiative and lowering prices as the competition’s prices become publically available suggesting that hospitals – not patients – are the biggest users of price transparency websites. Hospitals are also finding some ways to provide cheaper alternatives to more expensive procedures. State regulators should evaluate if a better metric other than charge prices, such as expected out-of-pocket payments, would evoke greater patient participation. Furthermore, states with higher prevalence of HSAs experience greater effects of PTR as expected since patients with HSAs have greater incentives to lower their costs. Patients should expect a shift towards plans that offer these types of savings accounts since they’ve shown to have a reduction of health costs on average per procedure in states with higher prevalence of HSAs.
ContributorsSabol, Joshua Lawrence (Author) / Reiser, Mark (Thesis director) / Ketcham, Jonathan (Committee member) / Dassanayake, Maduranga (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Department of Supply Chain Management (Contributor)
Created2015-05