Matching Items (642)
Filtering by

Clear all filters

153265-Thumbnail Image.png
Description
Corporations invest considerable resources to create, preserve and analyze

their data; yet while organizations are interested in protecting against

unauthorized data transfer, there lacks a comprehensive metric to discriminate

what data are at risk of leaking.

This thesis motivates the need for a quantitative leakage risk metric, and

provides a risk assessment system,

Corporations invest considerable resources to create, preserve and analyze

their data; yet while organizations are interested in protecting against

unauthorized data transfer, there lacks a comprehensive metric to discriminate

what data are at risk of leaking.

This thesis motivates the need for a quantitative leakage risk metric, and

provides a risk assessment system, called Whispers, for computing it. Using

unsupervised machine learning techniques, Whispers uncovers themes in an

organization's document corpus, including previously unknown or unclassified

data. Then, by correlating the document with its authors, Whispers can

identify which data are easier to contain, and conversely which are at risk.

Using the Enron email database, Whispers constructs a social network segmented

by topic themes. This graph uncovers communication channels within the

organization. Using this social network, Whispers determines the risk of each

topic by measuring the rate at which simulated leaks are not detected. For the

Enron set, Whispers identified 18 separate topic themes between January 1999

and December 2000. The highest risk data emanated from the legal department

with a leakage risk as high as 60%.
ContributorsWright, Jeremy (Author) / Syrotiuk, Violet (Thesis advisor) / Davulcu, Hasan (Committee member) / Yau, Stephen (Committee member) / Arizona State University (Publisher)
Created2014
150382-Thumbnail Image.png
Description
This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate

This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate between each two users. The whole trust checking process is divided into two steps: local checking and remote checking. Local checking directly contacts the email server to calculate the trust rate based on user's own email communication history. Remote checking is a distributed computing process to get help from user's social network friends and built the trust rate together. The email-based trust model is built upon a cloud computing framework called MobiCloud. Inside MobiCloud, each user occupies a virtual machine which can directly communicate with others. Based on this feature, the distributed trust model is implemented as a combination of local analysis and remote analysis in the cloud. Experiment results show that the trust evaluation model can give accurate trust rate even in a small scale social network which does not have lots of social connections. With this trust model, the security in both social network services and email communication could be improved.
ContributorsZhong, Yunji (Author) / Huang, Dijiang (Thesis advisor) / Dasgupta, Partha (Committee member) / Syrotiuk, Violet (Committee member) / Arizona State University (Publisher)
Created2011
154172-Thumbnail Image.png
Description
Due to the shortcomings of modern Mobile Device Management solutions, businesses

have begun to incorporate forensics to analyze their mobile devices and respond

to any incidents of malicious activity in order to protect their sensitive data. Current

forensic tools, however, can only look a static image of the device being examined,

making it difficult

Due to the shortcomings of modern Mobile Device Management solutions, businesses

have begun to incorporate forensics to analyze their mobile devices and respond

to any incidents of malicious activity in order to protect their sensitive data. Current

forensic tools, however, can only look a static image of the device being examined,

making it difficult for a forensic analyst to produce conclusive results regarding the

integrity of any sensitive data on the device. This research thesis expands on the

use of forensics to secure data by implementing an agent on a mobile device that can

continually collect information regarding the state of the device. This information is

then sent to a separate server in the form of log files to be analyzed using a specialized

tool. The analysis tool is able to look at the data collected from the device over time

and perform specific calculations, according to the user's specifications, highlighting

any correlations or anomalies among the data which might be considered suspicious

to a forensic analyst. The contribution of this paper is both an in-depth explanation

on the implementation of an iOS application to be used to improve the mobile forensics

process as well as a proof-of-concept experiment showing how evidence collected

over time can be used to improve the accuracy of a forensic analysis.
ContributorsWhitaker, Jeremy (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Yau, Stephen (Committee member) / Arizona State University (Publisher)
Created2015
157413-Thumbnail Image.png
Description
Rapid growth of internet and connected devices ranging from cloud systems to internet of things have raised critical concerns for securing these systems. In the recent past, security attacks on different kinds of devices have evolved in terms of complexity and diversity. One of the challenges is establishing secure communication

Rapid growth of internet and connected devices ranging from cloud systems to internet of things have raised critical concerns for securing these systems. In the recent past, security attacks on different kinds of devices have evolved in terms of complexity and diversity. One of the challenges is establishing secure communication in the network among various devices and systems. Despite being protected with authentication and encryption, the network still needs to be protected against cyber-attacks. For this, the network traffic has to be closely monitored and should detect anomalies and intrusions. Intrusion detection can be categorized as a network traffic classification problem in machine learning. Existing network traffic classification methods require a lot of training and data preprocessing, and this problem is more serious if the dataset size is huge. In addition, the machine learning and deep learning methods that have been used so far were trained on datasets that contain obsolete attacks. In this thesis, these problems are addressed by using ensemble methods applied on an up to date network attacks dataset. Ensemble methods use multiple learning algorithms to get better classification accuracy that could be obtained when the corresponding learning algorithm is applied alone. This dataset for network traffic classification has recent attack scenarios and contains over fifteen attacks. This approach shows that ensemble methods can be used to classify network traffic and detect intrusions with less training times of the model, and lesser pre-processing without feature selection. In addition, this thesis also shows that only with less than ten percent of the total features of input dataset will lead to similar accuracy that is achieved on whole dataset. This can heavily reduce the training times and classification duration in real-time scenarios.
ContributorsPonneganti, Ramu (Author) / Yau, Stephen (Thesis advisor) / Richa, Andrea (Committee member) / Yang, Yezhou (Committee member) / Arizona State University (Publisher)
Created2019
133360-Thumbnail Image.png
Description
This study asks the question: does gender-based discrimination exists within Arizona State University's Army Reserve Officer Training Corps (ROTC), and if so, what are the effects of such discrimination? Within this study, discrimination is defined as: the treatment or consideration of, or making a distinction in favor of or against,

This study asks the question: does gender-based discrimination exists within Arizona State University's Army Reserve Officer Training Corps (ROTC), and if so, what are the effects of such discrimination? Within this study, discrimination is defined as: the treatment or consideration of, or making a distinction in favor of or against, a person or thing based on the group, class, or category to which that person or thing belongs, rather than on individual merit. The researcher predicted that this study would show that gender-based discrimination operates within the masculine military culture of Army ROTC at ASU, resulting from women's hyper-visibility and evidenced by their lack of positive recognition and disbelief in having a voice in the program. These expectations were based on background research claiming that the token status of women in military roles causes them to be more heavily scrutinized, and they consequentially try to attain success by adapting to the masculine military culture by which they are constantly measured. For the purposes of this study, success is defined as: the attainment of wealth, favor, or eminence . This study relies on exploratory interviews and an online survey conducted with male and female Army ROTC cadets of all grade levels at Arizona State University. The interviews and survey collected demographic information and perspectives on individual experiences to establish an understanding of privilege and marginalization within the program. These results do support the prediction that women in Army ROTC at ASU face discrimination based on their unique visibility and lack of positive recognition and voice in the program. Likewise, the survey results indicate that race also has a significant impact on one's experience in Army ROTC, which is discussed later in this study in regard to needs for future research. ASU Army ROTC includes approximately 100 cadets, and approximately 30-40 of those cadets participated in this study. Additionally, the University of Arizona and the Northern Arizona University Army ROTC programs were invited to participate in this study and declined to do so, which would have offered a greater sample population. Nonetheless, the results of this research will be useful for analysis and further discussion of gender-equality in Army ROTC at Arizona State University.
ContributorsAllemang, Lindsey Ann (Author) / Wood, Reed (Thesis director) / Switzer, Heather (Committee member) / School of Politics and Global Studies (Contributor) / School of Social Transformation (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
131496-Thumbnail Image.png
Description
Genocide studies have traditionally focused on the perpetrator’s intent to eradicate a particular identity-based group, using the Holocaust as their model and point of comparison. Although some aspects of the Holocaust were undoubtedly unique, recent scholars have sought to challenge the notion that it was a singular phenomenon. Instead, they

Genocide studies have traditionally focused on the perpetrator’s intent to eradicate a particular identity-based group, using the Holocaust as their model and point of comparison. Although some aspects of the Holocaust were undoubtedly unique, recent scholars have sought to challenge the notion that it was a singular phenomenon. Instead, they draw attention to a recurring pattern of genocidal events throughout history by shifting the focus from intent to structure. One particular branch of scholars seeks to connect the ideology and tactics of imperialism with certain genocidal events. These anti-imperialist genocide scholars concede that their model cannot account for all genocides, but still claim that it creates meaningful connections between genocides committed by Western colonialist powers and those that have occurred in a neoimperialist world order shaped according to Western interests. The latter includes genocides in postcolonial states, which these scholars believe were shaped by the scars of their colonial past, as well as genocides in which imperial hegemons assisted local perpetrators. Imperialist and former colonial powers have contributed meaningfully to all of these kinds of genocides, yet their contributions have largely been ignored due to their own influence on the creation of the current international order. Incorporating the anti-imperialist perspective into the core doctrine of genocide studies may lead to breakthroughs in areas of related policy and practice, such as prevention and accountability.
ContributorsParker, Ashleigh Mae (Author) / Thies, Cameron (Thesis director) / Sivak, Henry (Committee member) / School of Politics and Global Studies (Contributor) / School of Social Transformation (Contributor) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131514-Thumbnail Image.png
Description
Political polarization is the coalescence of political parties -- and the individuals of which parties are composed -- around opposing ends of the ideological spectrum. Political parties in the United States have always been divided, however, in recent years this division has only intensified. Recently, polarization has also wound its

Political polarization is the coalescence of political parties -- and the individuals of which parties are composed -- around opposing ends of the ideological spectrum. Political parties in the United States have always been divided, however, in recent years this division has only intensified. Recently, polarization has also wound its way to the Supreme Court and the nomination processes of justices to the Court. This paper examines how prevalent polarization in the Supreme Court nomination process has become by looking specifically at the failed nomination of Judge Merrick Garland and the confirmations of now-Justices Neil Gorsuch and Brett Kavanaugh. This is accomplished by comparing the ideologies and qualifications of the three most recent nominees to those of previous nominees, as well as analysing the ideological composition of the Senate at the times of the individual nominations.
ContributorsJoss, Jacob (Author) / Hoekstra, Valerie (Thesis director) / Critchlow, Donald (Committee member) / Computer Science and Engineering Program (Contributor) / School of Politics and Global Studies (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
133890-Thumbnail Image.png
Description
As the U.S. reckons with the reality of sexual assault and harassment in the wake of the #MeToo movement, it is particularly important to consider sexual assault in the military, an institution that is a massive employer and the face of the U.S. abroad. Media coverage is a catalyst for

As the U.S. reckons with the reality of sexual assault and harassment in the wake of the #MeToo movement, it is particularly important to consider sexual assault in the military, an institution that is a massive employer and the face of the U.S. abroad. Media coverage is a catalyst for change, and the nature and scope of coverage is indicative of public and political attitudes. This thesis uses both quantitative and qualitative data to analyze characteristics of military sexual assault cases that complicate media coverage and to identify strengths and weaknesses of the media's approach to such stories. On the quantitative side, it takes advantage of nearly 600 case reports of sexual assault from U.S. military bases in Japan that were categorized to identify themes such as disposition outcomes, alcohol involvement and victim participation in investigations. Qualitatively, this thesis includes interviews with military officials, victims' advocates, journalists and other stakeholders that help to create a more holistic understanding of how media cover military sexual assault. Notably, this thesis finds that a lack of public interest in the military, a lack of congruency between military and civilian systems, and a highly complex hierarchy that limits journalists' access to military sources and data all complicate coverage. Drawing from these conclusions, it recommends that the media avoid episodic reporting, focus on personalizing stories in an institutional context, embrace accountability journalism and dedicate resources to pursuing complex investigations. It also acknowledges the important role of non-traditional media in the future of information sharing on the topic of military sexual assault.
ContributorsArmstrong, Mia Anne (Author) / Warner, Carolyn (Thesis director) / Gilger, Kristin (Committee member) / Walter Cronkite School of Journalism and Mass Communication (Contributor) / School of Politics and Global Studies (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133895-Thumbnail Image.png
Description
This paper addresses policy solutions for the continuing medical education of providers treating LGBTQ patients. As a population subject to significant health disparities, LGBTQ individuals are at risk of discrimination and harm when entering the medical context and, as such, require particular provider competence in approaches to care. This population

This paper addresses policy solutions for the continuing medical education of providers treating LGBTQ patients. As a population subject to significant health disparities, LGBTQ individuals are at risk of discrimination and harm when entering the medical context and, as such, require particular provider competence in approaches to care. This population is also vulnerable to distinctive medical needs which often position individuals as patients, making clinical interactions a key component of equality in social contexts. Through literature review and policy analysis, this paper addresses how systemic inequality has been propagated in the medical community and suggests an intervention in developing critical CME materials and requirements which seek to promote provider knowledge of best practices for the treatment of LGBTQ individuals. The ultimate policy suggestion incorporates existing policy promulgated at the state and professional organization level to fully respond to the challenges of informing providers of best practice in a meaningful, practicable manner. This policy specifies the importance of mandatory content-based learning hour requirements, in order to ensure that all providers meet a minimum level of competency in providing care to minority and at-risk populations, particularly the LGBTQ population. Moreover, it encompasses an understanding of the role and importance of outside organizations with subject-area expertise and endows such organizations with the power to interact with the policy and curriculum formation process. In so doing, it addresses many of the underlying gaps in provider education on this critical issue and promotes equity in health outcomes for all patients. Keywords: LGBTQ health, continuing medical education, health policy
ContributorsBlessinger, Kayla Nicole (Author) / White, Adrienne (Thesis director) / Coplan, Bettie (Committee member) / School of Politics and Global Studies (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
134183-Thumbnail Image.png
Description
This thesis takes the form of a market research report with the goal of analyzing the implications of the United Kingdom (UK) leaving the European Union (EU) (known as “Brexit”) on London’s office commercial real estate market. The ultimate goal of this report is to make a prediction, firmly grounded

This thesis takes the form of a market research report with the goal of analyzing the implications of the United Kingdom (UK) leaving the European Union (EU) (known as “Brexit”) on London’s office commercial real estate market. The ultimate goal of this report is to make a prediction, firmly grounded in quantitative and qualitative research conducted over the past several months, as to the direction of London’s commercial real estate market going forward (post-Brexit). Within the commercial real estate sector, this paper narrows its focus to the office segment of the London market.

Understanding the political landscape is crucial to formulating a reasonable prediction as to the future of the London market. Aside from research reports and articles, our main insights into the political direction of Brexit come from our recordings from meetings in March of 2017 with two high-ranking members of Parliament and one member of the House of Lords—all of whom are members of the Tory Party (the meetings being held under the condition of anonymity). The below analysis will be followed by a discussion of the economics of Brexit, primarily focusing on the economic risks and uncertainties which have emerged after the vote, and which currently exist today. Such risks include the UK losing its financial passporting rights, weakening GDP and currency value, the potential for a reduction in foreign direct investment (FDI), and the potential loss of the service sector in the city of London due to not being able to access the European Single Market.

The report will shift focus to analyzing three competing viewpoints of the direction of the London market based on recordings from interviews of stakeholders in the London real estate market. One being an executive of one of the largest REITs in the UK, another being the Global Head of Real Estate at a top asset management firm, and another being a director at a large property consulting firm. The report includes these differing “sub-theses” in order to try to make sense of the vast market uncertainties post-Brexit as well as to contrast their viewpoints with where the market is currently and with the report’s investment recommendation.

The remainder of the report will consist of the methods used for analyzing market trends including how the data was modeled in order to make the investment recommendation. The report will analyze real estate and market metrics pre-Brexit, immediately after the vote, post-Brexit, and will conclude with future projections encapsulating the investment recommendation.
ContributorsHorn, Jonathan (Co-author) / Sidi, Adam (Co-author) / Bonadurer, Werner (Thesis director) / McDaniel, Cara (Committee member) / Department of Finance (Contributor) / School of Politics and Global Studies (Contributor) / Economics Program in CLAS (Contributor) / Barrett, The Honors College (Contributor)
Created2017-12