Matching Items (15)

135962-Thumbnail Image.png

Policy Strategies for Transnational Governance and Armament Control for Cyber-Weapons

Description

Cyber-weapons and the rapid progression of utilizing cyberspace in conflict poses several risks to states and their ability to maintain control of their respective technological infrastructures. Susceptibility to these weapons

Cyber-weapons and the rapid progression of utilizing cyberspace in conflict poses several risks to states and their ability to maintain control of their respective technological infrastructures. Susceptibility to these weapons extend to virtually all existing nations, and indicates a critical need for transnational organizations and their members to establish collective strategies for governing cyber-arms. In this paper, the United Nations, as a prime example of an influential transnational organization, is utilized as a case study for a framework that seeks to define and establish guidelines for arms control policy as it relates to cyber-weapons. Presented is a strategy that seeks to define cyber-warfare and cyber-weapons, distinguish it from other existing forms of weapons and warfare, and outline recommended actions for the United Nations and its affiliates, including the United Nations Office for Disarmament Affairs and United Nations Security Council.

Contributors

Agent

Created

Date Created
  • 2015-12

135218-Thumbnail Image.png

Women in IS (or Lack Thereof)

Description

Research has found there is a lack of women present in the IS industry. In order to combat this problem, this research examines why women are not choosing IS majors

Research has found there is a lack of women present in the IS industry. In order to combat this problem, this research examines why women are not choosing IS majors at the university level. At Arizona State University, the Computer Information Systems undergraduate degree program is only 23 percent female. Many different factors can influence the decision to choose a major, so survey methodology was used to ascertain what factors were the most important to different demographic groups when making this decision. The study found no significant gender difference when making this decision, but rather a difference between specific majors. Genuine interest, interesting work and high career earnings were identified as the most influential reasons for choosing a college major. The results were used to create recommendations for the IS Department at ASU to implement in the next year and encourage more female participation in the CIS undergraduate degree program.

Contributors

Created

Date Created
  • 2016-05

133409-Thumbnail Image.png

Darknet Markets Analysis & Business Intelligence

Description

In the era of big data, the impact of information technologies in improving organizational performance is growing as unstructured data is increasingly important to business intelligence. Daily data gives businesses

In the era of big data, the impact of information technologies in improving organizational performance is growing as unstructured data is increasingly important to business intelligence. Daily data gives businesses opportunities to respond to changing markets. As a result, many companies invest lots of money in big data in order to obtain adverse outcomes. In particular, analysis of commercial websites may reveal relations of different parties in digital markets that pose great value to businesses. However, complex e­commercial sites present significant challenges for primary web analysts. While some resources and tutorials of web analysis are available for studying, some learners especially entry­level analysts still struggle with getting satisfying results. Thus, I am interested in developing a computer program in the Python programming language for investigating the relation between sellers’ listings and their seller levels in a darknet market. To investigate the relation, I couple web data retrieval techniques with doc2vec, a machine learning algorithm. This approach does not allow me to analyze the potential relation between sellers’ listings and reputations in the context of darknet markets, but assist other users of business intelligence with similar analysis of online markets. I present several conclusions found through the analysis. Key findings suggest that no relation exists between similarities of different sellers’ listings and their seller levels in rsClub Market. This study can become a great and unique example of web analysis and create potential values for modern enterprises.

Contributors

Agent

Created

Date Created
  • 2018-05

136774-Thumbnail Image.png

Clinical Decision Aids: An Investigation of the Necessity of Patient Education Platforms that Incorporate Health Literacy

Description

Considering the overwhelming prevalence of BPH, how can it best be managed in light of the aging population? The purpose of this investigation is to illustrate that BPH and LUTS

Considering the overwhelming prevalence of BPH, how can it best be managed in light of the aging population? The purpose of this investigation is to illustrate that BPH and LUTS are conditions that are highly conducive to health literacy technology interventions. This objective will be met by: a) Providing an overview of the clinically relevant information regarding BPH, including anatomy, physiology, epidemiology, symptoms, and medical treatment for the disease; b) Establishing the necessity for novel health care delivery solutions by identifying past successes and challenges associated with technologic advances in related fields; c) Providing evidence of a lack of a systematic approach to BPH education, especially as it relates to health literacy. The relative successes and failures of previously established clinical decision aids will be discussed, leading to recommendations on how to improve upon these standards. Finally, the procedures and results of a pilot study will be analyzed in an effort to further highlight the necessity of engaging patients in the clinical decision making process.

Contributors

Created

Date Created
  • 2014-12

137259-Thumbnail Image.png

Prenatal Care 2.0 - Evolving Delivery Models and the Role of Mobile Technology

Description

Prenatal care is a widely administered preventative care service, and its adequate use has been shown to decrease poor infant and maternal health outcomes. Today however, in the United States,

Prenatal care is a widely administered preventative care service, and its adequate use has been shown to decrease poor infant and maternal health outcomes. Today however, in the United States, preterm birth rates remain among the highest in the industrialized world, with low socioeconomic women having the highest risk of preterm births. This group of women also face the greatest barriers to access adequate prenatal care in the United States. This paper explores the viability of short message service to help bridge gaps in prenatal care for low socioeconomic women in the United States and provides areas for further research.

Contributors

Agent

Created

Date Created
  • 2014-05

129660-Thumbnail Image.png

Event sequence modeling of IT adoption in healthcare

Description

Information systems research is replete with examples of the importance of business processes defining IT adoption. Business processes are influenced by both organizational and operational concerns. We evaluate the comparative

Information systems research is replete with examples of the importance of business processes defining IT adoption. Business processes are influenced by both organizational and operational concerns. We evaluate the comparative importance of operational and organizational influences for complementary IT systems. In the context of acute-care hospitals the analysis shows that an organizational approach to automating a process is related to different financial outcomes than an operational approach. Six complementary systems supporting a three-stage medication management process are studied: prescribing, dispensing, and administration. The analysis uses firm-level, panel data extracted from the HIMSS Analytics database spanning ten years of IT adoption for 140 hospitals. We have augmented the HIMSS dataset with matching demographic and financial details from the American Hospital Association and the Centers for Medicare and Medicaid Services. Using event sequence analysis we explore whether organizations are more likely to adopt organization boundary spanning systems and if the sequence of adoption follows the temporal ordering of the business process steps. The research also investigates if there is a relationship between the paths to IT adoption and financial performance. Comparison of the two measures suggests that the organizational model of adoption is observed more often in the data. Following the organizational model of adoption is associated with approximately $155 dollar increase in net income per patient day; whereas the operational model of adoption is associated with approximately $225 dollars decrease in net income per patient day. However, this effect diminishes with the adoption of each additional system thus demonstrating that the adoption path effects may only be relevant in the short-term.

Contributors

Agent

Created

Date Created
  • 2013-09-05

149668-Thumbnail Image.png

Privacy preserving service discovery and ranking for multiple user QoS requirements in service-based software systems

Description

Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other

Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different entities and physically distributed across the Internet. Compared with traditional software system components which are usually specifically designed for the target systems and bound tightly, the interfaces of services and their communication protocols are standardized, which allow SBS systems to support late binding, provide better interoperability, better flexibility in dynamic business logics, and higher fault tolerance. The development process of SBS systems can be divided to three major phases: 1) SBS specification, 2) service discovery and matching, and 3) service composition and workflow execution. This dissertation focuses on the second phase, and presents a privacy preserving service discovery and ranking approach for multiple user QoS requirements. This approach helps service providers to register services and service users to search services through public, but untrusted service directories with the protection of their privacy against the service directories. The service directories can match the registered services with service requests, but do not learn any information about them. Our approach also enforces access control on services during the matching process, which prevents unauthorized users from discovering services. After the service directories match a set of services that satisfy the service users' functionality requirements, the service discovery approach presented in this dissertation further considers service users' QoS requirements in two steps. First, this approach optimizes services' QoS by making tradeoff among various QoS aspects with users' QoS requirements and preferences. Second, this approach ranks services based on how well they satisfy users' QoS requirements to help service users select the most suitable service to develop their SBSs.

Contributors

Agent

Created

Date Created
  • 2011

150987-Thumbnail Image.png

Confidentiality protection of user data and adaptive resource allocation for managing multiple workflow performance in service-based systems

Description

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time

Contributors

Agent

Created

Date Created
  • 2012

153032-Thumbnail Image.png

Discovering and using patterns for countering security challenges

Description

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.

Contributors

Agent

Created

Date Created
  • 2014

154772-Thumbnail Image.png

Consumption in the age of digital plenty: three essays into an emerging phenomenon

Description

The recent changes in the software markets gave users an unprecedented number

of alternatives for any given task. In such a competitive environment, it is imperative

to understand what drives user behavior.

The recent changes in the software markets gave users an unprecedented number

of alternatives for any given task. In such a competitive environment, it is imperative

to understand what drives user behavior. To that end, the research presented in

this dissertation, tries to uncover the impact of business strategies often used in the

software markets.

The dissertation is organized into three distinct studies into user choice and post

choice use of software. First using social judgment theory as foundation, zero price

strategies effects on user choice is investigated, with respect to product features,

consumer characteristics, and context effects. Second, role of social features in

moderating network effects on user choice is studied. And finally, the role of social

features on the effectiveness of add-on content strategy on continued user engagement

is investigated.

The findings of this dissertation highlight the alignments between popular business

strategies and broad software context. The dissertation contributes to the litera-

ture by uncovering hitherto overlooked complementarities between business strategy

and product features: (1) zero price strategy enhances utilitarian features but not

non-utilitarian features in software choice, (2) social features only enhance network

externalities but not social influence in user choice, (3) social features enhance the

effect of add-on content strategy in extending software engagement.

Contributors

Agent

Created

Date Created
  • 2016